--- apiVersion: v1 items: - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: builder creationTimestamp: "2026-04-24T14:20:42Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"4318ead3-aa1b-47c5-8ac4-5cd48814ce25"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:42Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:42Z" name: builder-dockercfg-rrtnn namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: builder uid: 4318ead3-aa1b-47c5-8ac4-5cd48814ce25 resourceVersion: "37498" uid: f0cc912d-518f-4a8f-a045-58f8f13688fa type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY4NiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: default creationTimestamp: "2026-04-24T14:20:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fd2e0a10-5ea7-44c5-aaff-0fb003a5cadc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:37Z" name: default-dockercfg-r7z8r namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: default uid: fd2e0a10-5ea7-44c5-aaff-0fb003a5cadc resourceVersion: "37319" uid: 90ca1382-1e2f-413b-af04-fd69c35ca307 type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDY5OCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: deployer creationTimestamp: "2026-04-24T14:20:41Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"ff1c0b4a-7127-43fd-b460-19a1bdbb0509"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:41Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:42Z" name: deployer-dockercfg-cwvlp namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: deployer uid: ff1c0b4a-7127-43fd-b460-19a1bdbb0509 resourceVersion: "37503" uid: e4bb4d3a-3e69-4034-bebe-9ee08b287468 type: kubernetes.io/dockercfg - apiVersion: v1 data: tls.crt: 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 tls.key: MTY3NSBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/description: 'Secret contains a pair signed serving certificate/key that is generated by Service CA operator for service/dns-default with hostname dns-default.openshift-dns.svc and is annotated to the service with annotating a service resource with ''service.beta.openshift.io/serving-cert-secret-name: dns-default-metrics-tls''. The certificate is valid for 2 years.' openshift.io/owning-component: service-ca service.alpha.openshift.io/expiry: "2028-04-23T14:26:29Z" service.beta.openshift.io/expiry: "2028-04-23T14:26:29Z" service.beta.openshift.io/originating-service-name: dns-default service.beta.openshift.io/originating-service-uid: b2c8ec29-9b97-4730-9129-0f5ad17e8436 creationTimestamp: "2026-04-24T14:26:30Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: .: {} f:tls.crt: {} f:tls.key: {} f:metadata: f:annotations: .: {} f:openshift.io/description: {} f:openshift.io/owning-component: {} f:service.alpha.openshift.io/expiry: {} f:service.beta.openshift.io/expiry: {} f:service.beta.openshift.io/originating-service-name: {} f:service.beta.openshift.io/originating-service-uid: {} f:ownerReferences: .: {} k:{"uid":"b2c8ec29-9b97-4730-9129-0f5ad17e8436"}: {} f:type: {} manager: service-ca-operator operation: Update time: "2026-04-24T14:26:30Z" name: dns-default-metrics-tls namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: Service name: dns-default uid: b2c8ec29-9b97-4730-9129-0f5ad17e8436 resourceVersion: "7734" uid: 718320ab-e2b5-4d20-bcf0-65d997a8ed84 type: kubernetes.io/tls - apiVersion: v1 data: .dockercfg: NDYxNCBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: dns creationTimestamp: "2026-04-24T14:20:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"57c8fd1f-c436-4738-bade-75f6f8d78c5d"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:37Z" name: dns-dockercfg-6p8rb namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: dns uid: 57c8fd1f-c436-4738-bade-75f6f8d78c5d resourceVersion: "37339" uid: 9dde3190-270b-4755-9973-490a292131cd type: kubernetes.io/dockercfg - apiVersion: v1 data: .dockercfg: NDc4MiBieXRlcyBsb25n kind: Secret metadata: annotations: openshift.io/internal-registry-auth-token.binding: bound openshift.io/internal-registry-auth-token.service-account: node-resolver creationTimestamp: "2026-04-24T14:20:37Z" managedFields: - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.service-account: {} f:ownerReferences: k:{"uid":"fd603689-fd25-4ca8-8f9b-e34c397231bc"}: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_service-account-controller operation: Apply time: "2026-04-24T14:20:37Z" - apiVersion: v1 fieldsType: FieldsV1 fieldsV1: f:data: f:.dockercfg: {} f:metadata: f:annotations: f:openshift.io/internal-registry-auth-token.binding: {} f:type: {} manager: openshift.io/image-registry-pull-secrets_image-pull-secret-controller operation: Apply time: "2026-04-24T14:56:37Z" name: node-resolver-dockercfg-xvfpf namespace: openshift-dns ownerReferences: - apiVersion: v1 kind: ServiceAccount name: node-resolver uid: fd603689-fd25-4ca8-8f9b-e34c397231bc resourceVersion: "37318" uid: 39eb4e2e-a20b-4eab-b8bc-7c858a3e6400 type: kubernetes.io/dockercfg kind: SecretList metadata: resourceVersion: "44262"